960 resultados para User studies
Resumo:
Phenomenography is a research approach devised to allow the investigation of varying ways in which people experience aspects of their world. Whilst growing attention is being paid to interpretative research in LIS, it is not always clear how the outcomes of such research can be used in practice. This article explores the potential contribution of phenomenography in advancing the application of phenomenological and hermeneutic frameworks to LIS theory, research and practice. In phenomenography we find a research toll which in revealing variation, uncovers everyday understandings of phenomena and provides outcomes which are readily applicable to professional practice. THe outcomes may be used in human computer interface design, enhancement, implementation and training, in the design and evaluation of services, and in education and training for both end users and information professionals. A proposed research territory for phenomenography in LIS includes investigating qualitative variation in the experienced meaning of: 1) information and its role in society 2) LIS concepts and principles 3) LIS processes and; 4) LIS elements.
Resumo:
The Internet is one of the most significant information and communication technologies to emerge during the end of the last century. It created new and effective means by which individuals and groups communicate. These advances led to marked institutional changes most notably in the realm of commercial exchange: it did not only provide the high-speed communication infrastructure to business enterprises; it also opened them to the global consumer base where they could market their products and services. Commercial interests gradually dominated Internet technology over the past several years and have been a factor in the increase of its user population and enhancement of infrastructure. Such commercial interests fitted comfortably within the structures of the Philippine government. As revealed in the study, state policies and programs make use of Internet technology as an enabler of commercial institutional reforms using traditional economic measures. Yet, despite efforts to maximize the Internet as an enabler for market-driven economic growth, the accrued benefits are yet to come about; it is largely present only in major urban areas and accessible to a small number of social groups. The failure of the Internet’s developmental capability can be traced back to the government’s wholesale adoption of commercial-centered discourse. The Internet’s developmental gains (i.e. instrumental, communicative and emancipatory) and features, which were always there since its inception, have been visibly left out in favor of its commercial value. By employing synchronic and diachronic analysis, it can be shown that the Internet can be a vital technology in promoting genuine social development in the Philippines. In general, the object is to realize a social environment of towards a more inclusive and participatory application of Internet technology, equally aware of the caveats or risks the technology may pose. It is argued further that there is a need for continued social scientific research regarding the social as and developmental implications of Internet technology at local level structures, such social sectors, specific communities and organizations. On the meta-level, such approach employed in this research can be a modest attempt in increasing the calculus of hope especially among the marginalized Filipino sectors, with the use of information and communications technologies. This emerging field of study—tentatively called Progressive Informatics—must emanate from the more enlightened social sectors, namely: the non-government, academic and locally-based organizations.
Resumo:
With the advent of digital media and online information resources, public libraries as physical destinations for information access are being increasingly challenged. As a response, many libraries follow the trend of removing bookshelves in order to provide more floorspace for social interaction and collaboration. Such spaces follow a Commons 2.0 model: they are designed to support collaborative work and social learning. The acquisition of skills and knowledge is facilitated as a result of being surrounded by and interacting with a community of likeminded others. Based on the results of a case study on a Commons 2.0 library space, this paper describes several issues of collaboration and social learning in public library settings. Acknowledging the significance of the architectural characteristics of the physical space, we discuss opportunities for ambient media to better reflect the social attributes of the library as a place; i.e. amplify the sense of other co-present library visitors and provide opportunities for shared encounters and conversations, which would remain invisible otherwise. We present the design of a user check-in system for improving the library as a physical destination for social learning, sharing, and inspiration for and by the community.
Resumo:
Within the communicative space online Social Network Sites (SNS) afford, Niche Social Networks Sites (NSNS) have emerged around particular geographic, demographic or topic-based communities to provide what broader SNS do not: specified and targeted content for an engaged and interested community. Drawing on a research project developed at the Queensland University of Technology in conjunction with the Australian Smart Services Cooperative Research Centre that produced an NSNS based around Adventure Travel, this paper outlines the main drivers for community creation and sustainability within NSNS. The paper asks what factors motivate users to join and stay with these sites and what, if any, common patterns can be noted in their formation. It also outlines the main barriers to online participation and content creation in NSNS, and the similarities and differences in SNS and NSNS business models. Having built a community of 100 registered members, the staywild.com.au project was a living laboratory, enabling us to document the steps taken in producing a NSNS and cultivating and retaining active contributors. The paper incorporates observational analysis of user-generated content (UGC) and user profile submissions, statistical analysis of site usage, and findings from a survey of our membership pool in noting areas of success and of failure. In drawing on our project in this way we provide a template for future iterations of NSNS initiation and development across various other social settings: not only niche communities, but also the media and advertising with which they engage and interact. Positioned within the context of online user participation and UGC research, our paper concludes with a discussion of the ways in which the tools afforded by NSNS extend earlier understandings of online ‘communities of interest’. It also outlines the relevance of our research to larger questions about the diversity of the social media ecology.
Resumo:
In recent times, light gauge steel frame (LSF) wall systems are increasingly used in the building industry. They are usually made of cold-formed and thin-walled steel studs that are fire-protected by two layers of plasterboard on both sides. A composite LSF wall panel system was developed recently, where an insulation layer was used externally between the two plasterboards to improve the fire performance of LSF wall panels. In this research, finite element thermal models of the new composite panels were developed using a finite element program, SAFIR, to simulate their thermal performance under both standard and Eurocode design fire curves. Suitable apparent thermal properties of both the gypsum plasterboard and insulation materials were proposed and used in the numerical models. The developed models were then validated by comparing their results with available standard fire test results of composite panels. This paper presents the details of the finite element models of composite panels, the thermal analysis results in the form of time-temperature profiles under standard and Eurocode design fire curves and their comparisons with fire test results. Effects of using rockwool, glass fibre and cellulose fibre insulations with varying thickness and density were also investigated, and the results are presented in this paper. The results show that the use of composite panels in LSF wall systems will improve their fire rating, and that Eurocode design fires are likely to cause severe damage to LSF walls than standard fires.
Resumo:
Organizations from every industry sector seek to enhance their business performance and competitiveness through the deployment of contemporary information systems (IS), such as Enterprise Systems (ERP). Investments in ERP are complex and costly, attracting scrutiny and pressure to justify their cost. Thus, IS researchers highlight the need for systematic evaluation of information system success, or impact, which has resulted in the introduction of varied models for evaluating information systems. One of these systematic measurement approaches is the IS-Impact Model introduced by a team of researchers at Queensland University of technology (QUT) (Gable, Sedera, & Chan, 2008). The IS-Impact Model is conceptualized as a formative, multidimensional index that consists of four dimensions. Gable et al. (2008) define IS-Impact as "a measure at a point in time, of the stream of net benefits from the IS, to date and anticipated, as perceived by all key-user-groups" (p.381). The IT Evaluation Research Program (ITE-Program) at QUT has grown the IS-Impact Research Track with the central goal of conducting further studies to enhance and extend the IS-Impact Model. The overall goal of the IS-Impact research track at QUT is "to develop the most widely employed model for benchmarking information systems in organizations for the joint benefit of both research and practice" (Gable, 2009). In order to achieve that, the IS-Impact research track advocates programmatic research having the principles of tenacity, holism, and generalizability through extension research strategies. This study was conducted within the IS-Impact Research Track, to further generalize the IS-Impact Model by extending it to the Saudi Arabian context. According to Hofsted (2012), the national culture of Saudi Arabia is significantly different from the Australian national culture making the Saudi Arabian culture an interesting context for testing the external validity of the IS-Impact Model. The study re-visits the IS-Impact Model from the ground up. Rather than assume the existing instrument is valid in the new context, or simply assess its validity through quantitative data collection, the study takes a qualitative, inductive approach to re-assessing the necessity and completeness of existing dimensions and measures. This is done in two phases: Exploratory Phase and Confirmatory Phase. The exploratory phase addresses the first research question of the study "Is the IS-Impact Model complete and able to capture the impact of information systems in Saudi Arabian Organization?". The content analysis, used to analyze the Identification Survey data, indicated that 2 of the 37 measures of the IS-Impact Model are not applicable for the Saudi Arabian Context. Moreover, no new measures or dimensions were identified, evidencing the completeness and content validity of the IS-Impact Model. In addition, the Identification Survey data suggested several concepts related to IS-Impact, the most prominent of which was "Computer Network Quality" (CNQ). The literature supported the existence of a theoretical link between IS-Impact and CNQ (CNQ is viewed as an antecedent of IS-Impact). With the primary goal of validating the IS-Impact model within its extended nomological network, CNQ was introduced to the research model. The Confirmatory Phase addresses the second research question of the study "Is the Extended IS-Impact Model Valid as a Hierarchical Multidimensional Formative Measurement Model?". The objective of the Confirmatory Phase was to test the validity of IS-Impact Model and CNQ Model. To achieve that, IS-Impact, CNQ, and IS-Satisfaction were operationalized in a survey instrument, and then the research model was assessed by employing the Partial Least Squares (PLS) approach. The CNQ model was validated as a formative model. Similarly, the IS-Impact Model was validated as a hierarchical multidimensional formative construct. However, the analysis indicated that one of the IS-Impact Model indicators was insignificant and can be removed from the model. Thus, the resulting Extended IS-Impact Model consists of 4 dimensions and 34 measures. Finally, the structural model was also assessed against two aspects: explanatory and predictive power. The analysis revealed that the path coefficient between CNQ and IS-Impact is significant with t-value= (4.826) and relatively strong with â = (0.426) with CNQ explaining 18% of the variance in IS-Impact. These results supported the hypothesis that CNQ is antecedent of IS-Impact. The study demonstrates that the quality of Computer Network affects the quality of the Enterprise System (ERP) and consequently the impacts of the system. Therefore, practitioners should pay attention to the Computer Network quality. Similarly, the path coefficient between IS-Impact and IS-Satisfaction was significant t-value = (17.79) and strong â = (0.744), with IS-Impact alone explaining 55% of the variance in Satisfaction, consistent with results of the original IS-Impact study (Gable et al., 2008). The research contributions include: (a) supporting the completeness and validity of IS-Impact Model as a Hierarchical Multi-dimensional Formative Measurement Model in the Saudi Arabian context, (b) operationalizing Computer Network Quality as conceptualized in the ITU-T Recommendation E.800 (ITU-T, 1993), (c) validating CNQ as a formative measurement model and as an antecedent of IS Impact, and (d) conceptualizing and validating IS-Satisfaction as a reflective measurement model and as an immediate consequence of IS Impact. The CNQ model provides a framework to perceptually measure Computer Network Quality from multiple perspectives. The CNQ model features an easy-to-understand, easy-to-use, and economical survey instrument.
Resumo:
Living with substance users negatively impacts upon family members in many ways, and distress is common. Despite these deep and wide-ranging impacts, supportive interventions for family members in their own right are rarely available. Thailand has substantial and growing problems with substance use, and there is very little support or family members of drug users, especially in community setting. The Thai Family Support (TFS) program was designed for implementation in primary health care units (PCUs) in Thailand. TFS was based on two approaches with existing empirical support in Western contexts—the 5-step method and CRAFT—with adaptations to a Thai setting that included integration with Buddhist practices. Its aims were to increase well-being of family members, reduce mental distress, improve family relationships between family members, and engage substance users in behaviour change. A small-scale randomised controlled trial on TFS with a Delayed Treatment control was conducted, with assessments at 8 weeks (Post 1) and 20-24 weeks (Post 2). Structured interviews with participants and PCU staff and an examination of five case studies augmented the quantitative results. Mixed Model Analyses were applied to quantitative outcomes, and thematic analysis was used for qualitative data. Thirty-six participants (18 in each of Immediate and Delayed Conditions) were recruited. A significant difference at Baseline between the two conditions was observed on the Thai GHQ-28 and Gender, but it was not possible to statistically control for these effects. There was a significant Time by Condition interaction on the Thai GHQ-28, WHOQOL-BREF-THAI and FAS, reflecting greater improvements in the Immediate condition by Post 1, but with the Delayed condition meeting or exceeding that effect by Post 2. On FES Cohesion and Conflict, there were falls across conditions at Post 2, but only Cohesion also showed a Time by Condition interaction, and that effect was consistent with a delayed impact of treatment. Overall, TFS by PCU staff in the Delayed Condition gave similar results to TFS conducted by the researcher, supporting the viability of its dissemination to standard health services. Qualitative data also confirmed the quantitative results. Most participants reported physiological and psychological improvements even though their substance-using relative did not change their drug use behaviour. After completing TFS, participants reported increased knowledge, group support and sharing feeling, having positive patient-professional relationship, having greater knowledge of substance abuse and social support. In particular, they changed their behaviour towards the substance user, resulting in improvements to family relationships. PCU staff gave similar responses on the efficacy of TFS, and saw it as feasible for routine use, although some implementation challenges were identified. The cultural adaptation and in particular the religious activities, were recognised by participants and PCU staff as an important component of TFS to support psychological health and well-being. Findings from this study showed the impact of substance use on family members and difficulties that they experienced when living with the substance users, resulting distresses and burden that may develop severe mental health disease. Drug use policies should be modified to support family members and response to their needs effectively for early prevention. This study also gave preliminary support for application of the TFS program in rural primary care settings and identified some policies that will be required for it to be disseminated more broadly.
Resumo:
We introduce a lightweight biometric solution for user authentication over networks using online handwritten signatures. The algorithm proposed is based on a modified Hausdorff distance and has favorable characteristics such as low computational cost and minimal training requirements. Furthermore, we investigate an information theoretic model for capacity and performance analysis for biometric authentication which brings additional theoretical insights to the problem. A fully functional proof-of-concept prototype that relies on commonly available off-the-shelf hardware is developed as a client-server system that supports Web services. Initial experimental results show that the algorithm performs well despite its low computational requirements and is resilient against over-the-shoulder attacks.
Resumo:
The increase of online services, such as eBanks, WebMails, in which users are verified by a username and password, is increasingly exploited by Identity Theft procedures. Identity Theft is a fraud, in which someone pretends to be someone else is order to steal money or get other benefits. To overcome the problem of Identity Theft an additional security layer is required. Within the last decades the option of verifying users based on their keystroke dynamics was proposed during login verification. Thus, the imposter has to be able to type in a similar way to the real user in addition to having the username and password. However, verifying users upon login is not enough, since a logged station/mobile is vulnerable for imposters when the user leaves her machine. Thus, verifying users continuously based on their activities is required. Within the last decade there is a growing interest and use of biometrics tools, however, these are often costly and require additional hardware. Behavioral biometrics, in which users are verified, based on their keyboard and mouse activities, present potentially a good solution. In this paper we discuss the problem of Identity Theft and propose behavioral biometrics as a solution. We survey existing studies and list the challenges and propose solutions.
Resumo:
The umbrella of Australian research higher degree (RHD) offerings has broadened from the traditional MPhil/PhD programmes to include a range of professional masters and doctoral degrees. This article reports on the experiences of three PhD students, engaged in an informally managed industry partnered research programme, described in this article as the work integrated research higher degree (WIRHD). Their learning process shares the attributes from both the traditional PhD programme and professional doctorates. However, because of the blended nature of the learning contexts, candidates engaged in the WIRHD programme must address a wider range of issues than those following the traditional RHD pathway. An exploratory case study approach was adopted with the view to develop an integrative framework to explain the various contexts that influence the learning experience of WIRHD candidates, as well as a structured approach to guide this contemporary form of industry partnered WIRHD process.
Resumo:
Pyrite and chalcopyrite mineral samples from Mangampet barite mine, Kadapa, Andhra Pradesh, India are used in the present study. XRD data indicate that the pyrite mineral has a face centered cubic lattice structure with lattice constant 5.4179 Å. Also it possesses an average particle size of 91.9 nm. An EPR study on the powdered samples confirms the presence of iron in pyrite and iron and Mn(II) in chalcopyrite. The optical absorption spectrum of chalcopyrite indicates presence of copper which is in a distorted octahedral environment. NIR results confirm the presence of water fundamentals and Raman spectrum reveals the presence of water and sulfate ions.
Resumo:
Computer worms represent a serious threat for modern communication infrastructures. These epidemics can cause great damage such as financial losses or interruption of critical services which support lives of citizens. These worms can spread with a speed which prevents instant human intervention. Therefore automatic detection and mitigation techniques need to be developed. However, if these techniques are not designed and intensively tested in realistic environments, they may cause even more harm as they heavily interfere with high volume communication flows. We present a simulation model which allows studies of worm spread and counter measures in large scale multi-AS topologies with millions of IP addresses.
Resumo:
The IEEE Wireless LAN standard has been a true success story by enabling convenient, efficient and low-cost access to broadband networks for both private and professional use. However, the increasing density and uncoordinated operation of wireless access points, combined with constantly growing traffic demands have started hurting the users' quality of experience. On the other hand, the emerging ubiquity of wireless access has placed it at the center of attention for network attacks, which not only raises users' concerns on security but also indirectly affects connection quality due to proactive measures against security attacks. In this work, we introduce an integrated solution to congestion avoidance and attack mitigation problems through cooperation among wireless access points. The proposed solution implements a Partially Observable Markov Decision Process (POMDP) as an intelligent distributed control system. By successfully differentiating resource hampering attacks from overload cases, the control system takes an appropriate action in each detected anomaly case without disturbing the quality of service for end users. The proposed solution is fully implemented on a small-scale testbed, on which we present our observations and demonstrate the effectiveness of the system to detect and alleviate both attack and congestion situations.
Resumo:
Could mobile telephony be harnessed for development in Papua New Guinea (PNG)? Could mobile phones be utilised to enhance the security and prosperity of rural communities? Could mobile phones be a useful tool in the achievement of the PNG 2050 Vision targets? This paper is based on literature review around use of mobile phones in development in Asia, Africa, and the Caribbean. It also draws on discussions with key players in PNG, such as NGOs, UN agencies, donor partners, telecommunication companies and the government of PNG. Anticipated benefits of mobile phone availability have not been fully realised in rural areas of PNG to date due to pricing, difficulties with recharging handset batteries in communities which do not have mains electricity supply, and also concerns about negative social changes related to mobile telephony, for example parental stress over youth forming unsuitable relationships. Nonetheless, there are manifest possible ways for mobile phone technology to change user communication patterns positively regarding economic output. In sectors as diverse as health, education and law and justice, discussions are currently underway to establish how mobile phones could be used to increase service delivery, particularly to rural and marginal communities.
Resumo:
In recent years, there has been a growing interest from the design and construction community to adopt Building Information Models (BIM). BIM provides semantically-rich information models that explicitly represent both 3D geometric information (e.g., component dimensions), along with non-geometric properties (e.g., material properties). While the richness of design information offered by BIM is evident, there are still tremendous challenges in getting construction-specific information out of BIM, limiting the usability of these models for construction. In this paper, we describe our approach for extracting construction-specific design conditions from a BIM model based on user-defined queries. This approach leverages an ontology of features we are developing to formalize the design conditions that affect construction. Our current implementation analyzes the component geometry and topological relationships between components in a BIM model represented using the Industry Foundation Classes (IFC) to identify construction features. We describe the reasoning process implemented to extract these construction features, and provide a critique of the IFC’s to support the querying process. We use examples from two case studies to illustrate the construction features, the querying process, and the challenges involved in deriving construction features from an IFC model.